• Title/Summary/Keyword: 물품등

Search Result 365, Processing Time 0.024 seconds

Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia (초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • Since the September 11, 2001, transnational crimes and terrorism have increased, the importance of border security has been emphasized and integrated CIQ capability has been required. The U.S., Canada, and Australia are consolidating CIQ to strengthen border security, focusing on strengthening travelers and goods immigration control and airports, ports and land border security. In 2003, the U.S. established the Customs and Border Protection(CBP) under the Department of Homeland Security. Canada also established the Canada Border Services Agency(CBSA) under the Public Safety Canada in 2003. The Australian Customs and Border Protection Service was integrated with the Department of Immigration and Border Protection(DIBP) and the Australian Border Force was established in 2015. However, Korea operates a distributed border management system for each CIQ task which is unable to respond to complex border threats such as illegal immigration, entry of terrorists, smuggling of drugs, and gun trade in the airports, ports and land borders. In order to solve this problem, it is possible to consider integrating sequentially the customs and quarantine services which have high similarities, and to integrate the entire CIQ tasks with the Korea Customs Service delegated to the immigration control duties in the mid to long term. There is also a plan to benchmark the CIQ single accountability agencies in the U.S., Canada, and Australia in accordance with the Korean situation and to establish a new integrated border security organization.

Farm Land Use Classification for the Planning of Planting of Eucalyptus Spp. at Mato Grosso do Sul of Brazil Using Remote Sensing and Geographic Information System (브라질 Mato Grosso do Sul 주에서의 유칼리나무 식재계획(植栽計劃)을 위한 농장토지이용구분(農場土地利用區分)에 관한 연구(硏究) - 원격탐사기술(遠隔探査技術)과 지리정보(地理情報)시스템(GIS)의 적용(適用) -)

  • Woo, Jong-Choon;Nobrega, Ricardo Campos;Imana-Encinas, Jose
    • Journal of Korean Society of Forest Science
    • /
    • v.88 no.2
    • /
    • pp.157-168
    • /
    • 1999
  • This paper analyzed vegetation and land use classification, slope and permanent preservation and legal reserves on the farm Jangada and Jamaica-Mato Grosso do Sul, Brazil, using satellite image for assisting the planning of planting Eucalyptus spp. This part of the State of Mato Grosso do Sul represents an important geopolitcal area, since it is located on the borders of Bolivia and Paraguay. Also exportation of goods can be achieved through hydrovias extending to Buenos Aires, Argentina-through the Paraguay River. Also there are road and railroad connection which link the soutreastern part of Brazil to the Andean countries. The vegetation map from sheet SF 21-Campo Grande of the RADAMBRASIL Project was used as the basis for the preliminary interpretation of coverage, and complemented by a visit of the field. After the initial interpretation of the image, definition of classes of use and land occupation were made, and files of spectral signatures were created. On the farms Jamaica and Jangada Open Arboreal Savanna and Grass Savanna are the predominant physiognomies occupying 68% of total area. In spite of the results being satisfactory at the present moment, the development of this project should be revised and adjusted based on the evaluations already made, including a greater detailing of environmental components, principally with respect to soil and topography.

  • PDF

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

Improving the Protection and Security System Outside the National Assembly Building (국회 외곽 경호·경비시스템 발전방향에 관한 연구)

  • Choi, O-Ho
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.113-135
    • /
    • 2019
  • Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.

A Study on the important issues of Documents Examination in the L/C Transactions (신용장거래에서 서류심사의 중요 논의에 관한 재 고찰)

  • Kim, Yong-Il
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.241-265
    • /
    • 2013
  • The purpose of this paper is to examine the Banks's Examination of Documents in the L/C Transactions. Most of all, this article deals with one of most important aspects of the law on documentary credits, namely, the compliance of documents presented with the terms and conditions of a letter of credit. In addition, the general principles of strict compliance will be considered and in the next, the requirements of specific documents such as invoices, transport documents and insurance policies. This area of letter of credit law is shaped not only by judge-made decisions but also the articles of Uniform Customs and Practice for Documentary Credits, the International Standard Banking Practice(ISBP Publication No.745) prepared by the Banking Committee of the International Chamber of Commerce as well as the position papers and opinions of the latter. Whether a document complies with the terms of a letter of credit is essentially a matter of examination and construction of the document in question against the terms of the letter of credit under which it is presented, articles of the UCP, ISBP as well as the opinions and statements of the Banking Committee. Most of all this article was focused on provisions of UCP600. Comparison with provisions of UCP500 have been drawn where appropriate.

  • PDF

The First Telescope in the Korean History I. Translation of Jeong's Report (한국사 최초의 망원경 I. 정두원(鄭斗源)의 "서양국기별장계(西洋國奇別狀啓)")

  • Ahn, Sang-Hyeon
    • Journal of Astronomy and Space Sciences
    • /
    • v.26 no.2
    • /
    • pp.237-266
    • /
    • 2009
  • In 1631 A.D. Jeong Duwon, an ambassador of the Joseon dynasty was sent to the Ming dynasty. There he met $Jo\tilde{a}o$ Rodrigues, a Jesuit missionary, in Dengzhou of Shandong peninsula. The missionary gave the ambassador a number of results of latest European innovations. A detailed description on this event was written in 'Jeong's official report regarding a message from an European country'(西洋國奇別狀啓), which is an important literature work to understand the event. Since the document was written in classical Chinese, we make a comprehensive translation to Korean with detailed notes. According to the report, the items that Rodrigues presented include four books written in Chinese that describe European discoveries about the world, a report on the tribute of new cannons manufactured by Portuguese in Macao, a telescope, a flintlock, a Foliot-type mechanical clock, a world atlas drawn by Matteo Ricci, an astronomical planisphere, and a sun-dial. We discuss the meaning of each item in the Korean history of science and technology. In particular, Jeong's introduction is an important event in the history of Korean astronomy, because the telescope he brought was the first one to be introduced in Korean history. Even though king Injo and his associates of the Joseon dynasty were well aware of the value as military armaments of new technologies such as telescopes, cannons, and flintlocks, they were not able to quickly adopt such technologies to defend against the military threat of Jurchen. We revisit the reason in view of the general history of science and technology of east-Asian countries in the 17th century.

An Analysis of the Effect of the Pilot Project for the Management of the Elderly's Food Service in Cheongju City: Focused on improving hygiene control (청주시 노인급식 관리지원 시범사업의 효과분석 : 위생관리개선을 중심으로)

  • Lee, Joo-Eun
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.431-441
    • /
    • 2021
  • In this study, the hygiene control status of meals for the elderly was investigated for the elderly care facilities, communal living families, and day care centers, which are members of the Cheongju Social Welfare Food Management Support Center, and the improvement of food hygiene management was compared and analyzed to find out the effectiveness of the pilot project after conducting management support such as hygiene education for the elderly and providing related supplies and information. The study found that after the first support, the average score of overall feeding hygiene control increased significantly from 63.13 points (out of 100) to 75.10 points (p<0.001) and from 75.10 points (out of 100) to 80.89 points (p<0.001). After primary support, 16 out of 29 items showed significant differences in average scores in the checklist, and 7 out of 29 after secondary visit support (p<0.05, p<0.01, p<0.001). Based on the effectiveness of the above-mentioned pilot project to support senior citizens' meal service management, more welfare facilities for senior citizens should be continuously supported by the Foodservice Management Support Center.

Risk Management and Strategies in Airport Security Check (공항 보안검색에 있어서의 위험관리와 대응과제)

  • Kim, Jae-Woon
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.89-113
    • /
    • 2013
  • Travel by airplane using airport in globalized modern society is familiar to our life but such airport can be a target of terrorists who would threaten our safety. However, aviation terrorism which is represented by 9.11 terror gives horror beyond our imagination to modern people. Since the first airplane hijacking in Peru in 1931 happened, security organization in each nation has taken various prevention measures to block aviation terrorism. The most realistic measures to prevent aviation terrorism would be security check activity to control approach of terrorist that passengers on airplane and cargos are checked to find out dangerous article like explosive etc. But security check activity in Korea shifted to security check activity focused on private security for efficiency of airport operation differently from security check activity in advanced countries where public interests is strengthened according to risk of terror after 9.11 system. That is, since Incheon airport opened in March 2001, security check system focused on the police was changed. Now Incheon international airport Corporation instructs and supervises security check job and private security personnel are in charge of actual security check activity. But this check system has limitation in blocking terror activity by terrorists which is systematized and intelligent as time passes due to deteriorated job satisfaction of private security personnel and confusing supervising system. Accordingly, it is suggested to introduce risk management skill which is one of management strategy of private corporation for security check activity to prevent terror activity. With this skill, risk factors of aviation terror are identified and analyzed regularly, and each process such as setting of priority, activity to reduce risk, and assessment of security is carried out. And it would be necessary to do efforts, for example, to properly change level of security check according to threat of terror such as to place policeman at airport security in case threat of terror is severe. On the other hand, it is necessary to establish national police organization for good communication of security check activity in field and supervising function, which can encourage systematization and specialization of aviation security job.

  • PDF

Research on the Measures and Driving Force behind the Three Major Works of Daesoon Jinrihoe in North Korea in Case of the Respective Types of Unification on the Korean Peninsula (한반도 통일 유형별 북한지역의 대순진리회 3대 중요사업 추진 여건과 방안 연구)

  • Park, Young-taek
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.39
    • /
    • pp.137-174
    • /
    • 2021
  • The main theme of this paper centers on how to promote Three Major Works of Daesoon Jinrihoe, charity aid, social welfare, and education projects, during the unification period. Determining the best methods of promotion is crucial because the Three Major Works must be carried out after unification, and the works must remain based on the practice of the philosophy of Haewon-sangsaeng (the Resolution of Grievances for Mutual Beneficence). The idea of Haewon-sangsaeng is in line with the preface of the U.N. Charter and the aim of world peace. North Korean residents are suffering from starvation under their devastated economy, which is certain to face a crisis of materialistic deficiency during reunification. In this study, the peaceful unification of Germany, unification under a period of sudden changes in Yemen, and the militarized unification of Vietnam were taken as case studies to diagnose and analyze the conditions which would affect the implementation of the Three Major Works. These three styles of unification commonly required a considerable budget and other forms of support to carry out the Three Major Works. Especially if unification were to occur after a period of sudden changes, this would require solutions to issues of food, shelter, and medical support due to the loss of numerous lives and the destruction of infrastructure. On the other hand, the UNHCR model was analyzed to determine the implications of expanding mental well prepared and sufficiently qualified professionals, reorganizing standard organizations within complex situations, task direction, preparing sufficient relief goods, budgeting, securing bases in border areas with North Korea, and establishing networks for sponsorship. Based on this, eight detailed tasks in the field of system construction could be used by the operators of the Three Major Works to prepare for unification. Additionally, nine tasks for review were presented in consideration of the timing of unification and the current situation between South and North Korea. In conclusion, in the event of unification, the Three Major Works should not be neglected during the transition period. The manual "Three Major Works during the Unification Period" should include strategic points on organizational formation and mission implementation, forward base and base operation, security and logistics preparation, public relations and external cooperation, safety measures, and transportation and contact systems.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.